Transport Layer - Compatibility Mode-2
Transport Layer - Compatibility Mode-2
– Within the TCP/IP protocol suite, Layer 4 operations are primarily handled by UDP and TCP.
UDP and TCP rely on IP at the network layer and use port numbers to identify what higher layer
application traffic is contained in the packet. ICMP is a protocol from the TCP/IP suite that
operates at the network layer and it too relies on IP. Unlike UDP and TCP, ICMP does not carry
user data. ICMP is primarily used by network devices for self-management and self-tuning
functions and by network engineers for troubleshooting network problems.
– The Network Basic Input/Output System (NetBIOS) was developed for IBM in 1983 by Sytek
Corporation and officially defines a session level interface and a data transport protocol. NetBIOS
was extended by IBM in 1985 to create the NetBIOS Extended User Interface (NetBEUI) protocol.
NetBEUI supports NetBIOS operations at the network layer. NetBEUI and NetBIOS are
commonly used in Microsoft and IBM LANs.
– NetBEUI operates at the network layer and interfaces directly with ISO’s Logical Link Control 2
(LLC2) at the data-link layer. NetBIOS interfaces with NetBEUI and with IBM’s Server Message
Block (SMB) protocol at the application layer. Together, NetBIOS and NetBEUI can be
considered to be operating from the network layer through to the presentation layer. NetBIOS and
NetBEUI depend on other hierarchical protocols, such as IP or IPX, to operate in a routed network.
– Novell’s proprietary protocol suite uses Sequenced Packet Exchange (SPX) at the transport layer
to implement reliable data delivery. In the early days of local area networking, Novell’s suite of
protocols was commonly implemented.
– AppleTalk Transaction Protocol (ATP) is used at the transport layer of legacy AppleTalk
networks and relies on AppleTalk’s Datagram Delivery Protocol (DDP) at the network layer.
Because ATP is incompatible with IP, new Mac networks usually use the TCP/IP protocol suite.
– Although legacy networks using IPX/SPX and AppleTalk still exist, troubleshooting these protocol
1. Session request (TCP SYN) – the initiating host sends a TCP synchronization packet, which
has the SYN bit set on, and contains the initiating host’s own sequence number (seq = x) for
the connection. This packet also contains information about the initiating hosts TCP receive-
window size.
2. Session request acknowledgment (TCP SYN-ACK) – the target host responds to the packet
from the initiating host by sending its own ‘synchronization acknowledgment’ packet. This
packet has both the ACK and SYN bits set on, and contains the acknowledgment number
generated by incrementing the sequence number from the initiating host by one (ack = x+1)
plus the new sequence number from the target host (seq = y). The purpose of this packet is to
inform the initiating host that the target host has received and understood the information
from the initiating host and inform the initiating host of the TCP receive-window size of the
target.
3. Session acknowledgment (TCP ACK) – the initiating hosts received the TCP SYN/ACK
packet from the target host and responds with a session acknowledgment packet. This packet
has the SYN bit set off and the ACK bit set on. The acknowledgment number in this packet
is generated by incrementing the sequence number from the target host by one (ack = y + 1).
The purpose of this packet is to inform the target host that the initiating host has received and
understood the information sent by the target host. Once the target host has received this
packet, the TCP session has been established, and reliable data exchange can begin.
– Recall that TCP receive-window sizes are exchanged between hosts as part of the TCP connection
establishment.
– This process will continue until the capacity of the slowest network link is saturated and network
contention is starting to occur. As the gap between the data transfer rate and threshold get smaller,
the rate at which the window grows gets smaller. This explains why, when downloading large files
from the Internet or across a wide area network, the transfer rate initially increases rapidly, but
plateaus to a fairly constant transfer rate for the remainder of the download.
– If the network becomes congested from another source, packets and acknowledgements in existing
traffic flows will be lost. This will cause the same process to operate in reverse, reducing the
receive-window size of the receiving host until there is little or no gap between the data transfer
rate and the threshold of the window.
– In its simplest form, the network engineer manually builds the NAT table. The table has addresses
used inside the network mapped to addresses used outside the network. Each table entry represents
a single host inside the network.
– The main disadvantage of static NAT is that it requires one outside address for each inside address
that needs to be translated. Because it is unlikely that all of the inside hosts will need to
communicate through the NAT router at the same time, static NAT wastes precious outside
addresses. Another significant disadvantage of static NAT is that it is must be manually
administered. Manual administration of a NAT table can be difficult for a small network and is
likely to be impossible for a large network.
– The main problem with dynamic NAT is that it can be more complex to troubleshoot as the
mapping entries in the table change. Sometimes this results in intermittent symptoms and
problems. Entries that fail to automatically expire from the NAT table also cause issues with
network operation as they do not release outside addresses that would have otherwise become
available.
– Dynamic NAT operates by examining the packets as they are processed for forwarding. If a
suitable entry already exists in the NAT table, the timer for that entry is reset, the address of the
packet is updated as appropriate, and the packet is forwarded. If the NAT table does not already
have a suitable entry, the NAT process uses an address from the pool of available outside addresses
to create a new entry before setting the expiration timer for the entry. It will then update the header
of the packet with the new addressing information, and forward the packet.
– If all of the outside addresses are currently in use, the NAT process drops the packet and returns an
error to the inside host.
– A significant consideration for implementing NAT with overload is that it can only be used for
sessions from network clients. Servers hosting specific applications must listen for session request
traffic on specific ports and therefore cannot make use of port address translation technology.
– Typically, a single host being used for normal Internet activities will maintain around a dozen
sessions through a NAT router at any given time. Consider these typical Internet browsing
activities:
o How many web pages are open at the same time?
o Is email or newsgroup software updating messages in the background?
o How many file download sessions are active?
o Are any IM applications running in the background?
o What background processes, like DNS, are supporting other applications?
– Opening Network Neighborhood in Windows displays the browse list for the network.
Periodically, the NetBIOS host computer contacts the master browser for a list of backup browsers
from which one is selected. The host computer then contacts the backup browser, retrieves the
browse list, and displays it to the user.
– If the client cannot locate a master browser on the network, it initiates a browser election to ensure
a master browser and at least one backup browser is elected in the network.
– The computer browser service only supplies NetBIOS name information. The NetBIOS name
discovery process is what occurs when a NetBIOS name needs to be resolved to a lower-level
network address. On a local network, this process is completed using either broadcasts to the local
network or using a unicast message to a NetBIOS name server if present. The NetBIOS name
resolution process is discussed later in this section.
– When an application or networking service on a host is stopped, the NetBIOS name for that service
on that host is available for use by another host. This process is called “NetBIOS Name Release”
and is the process that is used to remove services from the network when a network host is shut
down.
– During startup, the client computer requests its own name from the name server to check that no
other computer on the network has the same computer name. Recall that NetBIOS names must be
unique on the network. If the client computer is already registered in the network, the name
address currently being used by the client computer is returned. If the client computer is new to
the network, the server returns a message indicating that the requested information is not found,
and the client computer registers its own name, address, and services provided in the WINS
database. This information remains in the database until the machine is shut down when the client
computer requests its registration be released from the database.
• Windows computers configured to use a NBNS server do a number of things
during startup and shutdown.
– Therefore, if a broadcast fails to return a positive response, the host reverts to peer-to-peer
operation. This enables a computer to locate resources on a local network easily and to use a
NetBIOS name server if a required resource is not located on the local network segment.
– NetBIOS hosts configured as hybrid node clients also use both peer-to-peer and broadcast
operation for NetBIOS name registration and resolution. Unlike Mixed nodes, Hybrid nodes
default to using peer-to-peer and revert to using broadcast when peer-to-peer fails to return a
positive response.
– More complex wildcard masks can also be used to select patterns of addresses. For example, the
address 10.0.32.0 and wildcard mask 0.0.32.15 would select the first 15 host addresses in either the
10.0.0.0 network or the 10.0.32.0 network. Complex wildcard masks like this can provide
significant improvements in efficiency, especially in large networks with structured and controlled
IP addressing schemes. They also require that the network engineer have detailed and thorough
knowledge of the network address when designing these complex access list elements.
– Examine these descriptions of a simple e-mail traffic flow traversing a firewall router to
understand the relationship for addresses and ports between initiating and responding traffic:
4. Step 4.
• A control element permitting traffic from any port with an internal address to TCP port
110 on the ISP mail server address is configured near to the top of the access list.
• The ‘request for mail’ traffic matches this element and is allowed through the firewall
router.
7. Step 7
• A control element permitting traffic from TCP port 110 from the IP address of the ISP
mail server to any port on any internal IP address is configured near to the top of the
access list.
• The ‘reply with mail’ traffic matches this element and is allowed through the firewall
router.
– This process requires that the firewall router controlling this traffic would need to have a single
element permitting outbound traffic to TCP port 21 for FTP control data, but would require two
elements to allow inbound traffic. The first element would need to allow reply FTP control traffic
from TCP port 21 on the FTP server. The other element would need to allow new FTP data traffic
from TCP port 20 on the FTP server.
– While this can be achieved fairly easily in simple access lists, using the approach on more complex
access lists can be a bit more difficult. Consider an access list which must permit hosts 1-5 and 7-
20 access to remote web servers, but block access to that remote service for hosts 6 and 21-31.
Obviously, changing the order of the access list elements in this access list without regard to the
overall reason of the order would ‘break’ the access list.
– In order to optimize complex access lists, the network administrator must identify groups of access
list elements by purpose or intention. These groups can then be ordered such that the most heavily-
used group of elements is nearest the top.
– If encryption or tunneling protocols must be run through a NAT router, the network administrator
can create a static NAT entry for the required port for a single IP address on the inside of the NAT
router.
– If timers are too long, entries may stay in the NAT table longer than necessary, consuming the
available connection pool. In particularly busy networks, this may lead to memory problems on the
router and hosts may be unable to establish connections if the dynamic NAT table is full.
– The show ip nat translations command also has the optional keywords icmp, pptp, tcp and udp,
which allow the network engineer to limit the type of entries displayed. The network administrator
can also use the verbose keyword to display additional information about the entries in the table.
– Note that the debug command can also use a standard access list to limit the information being
displayed by the debug process to traffic matching the permit statements in the ACL.
– clear commands
When debugging NAT problems, it can be useful to reset NAT statistics or to clear the NAT table
of any dynamic entries. Use the command clear ip nat statistics to reset the NAT traffic statistics
counters. Use the command clear ip nat translations * to clear dynamic entries from the NAT
table.
– Other keywords can be used when clearing the NAT table. The forced keyword clears all IP NAT
translations even if they are currently in use. The inside keyword removes all inside addresses and
ports from the table, while the outside keyword removes all outside addresses and ports. Using the
tcp keyword only removes TCP-related entries. Using the udp keyword only removes UDP-
related NAT entries.
– The system log buffer uses volatile memory and is cleared by rebooting the router. Because of this,
it is recommended that system log events be redirected to an external system (discussed later in this
section).
– The first step is to ensure system logging is enabled (note that local system logging is on by
default). When configuring the logging buffer, set the size of the log buffer and the level of
message to log.
– The show logging command can be used to display the state of Syslog error and event logging,
including host addresses, and whether console logging is enabled. This command also displays
SNMP configuration parameters and protocol activity.
– Note that NTP sends traffic to and from UDP port 123. This needs to be allowed when configuring
the firewall router access list.
– The network administrator should also set the time zone local to the router so that the router knows
how far to adjust the UTC time signal received from the NTP time source. Use these commands to
configure the local time zone of the router:
– Router(config)#clock timezone [timezone-name] [hours-offset] [minutes-offset]
– This command can also be used to uniquely identify log messages from the router by specifying a
unique time zone name. Note that the timezone-name parameter is limited to eight characters.
– Recall from previous content that TCP window sizes are self-tuning. This self-tuning mechanism
can be seen in action when downloading a large file from the Internet. When the download starts,
the rate of transfer is quite slow, as the initial window size is relatively small. As the download
proceeds, the rate of download increases rapidly as the window size expands. As the TCP window
approaches its optimal size, the increase in the download rate slows until the rate is almost
constant. For the remainder of the download, the window size self-tunes to suit prevailing network
conditions.
– Although never intended as a troubleshooting tool, Telnet is particularly useful for transport layer
diagnostics.
– These tools have been covered in greater detail elsewhere in this curriculum and are mentioned
here in the context of troubleshooting options for transport layer issues on UNIX hosts.
– Each new version of the firewall capability has produced a tool with significantly greater features
than its predecessor.
– Because this is a setting that is not often used, it can be quite difficult to troubleshoot. Note that
like the NetBIOS node type, the NetBIOS Scope ID can also be controlled centrally from the
DHCP server, using DHCP option 47. Unlike the node type however, the Scope ID can also be
easily altered on the local machine through the network interface GUI.
– When duplicate NetBIOS names exist in a network, the duplicate hosts are unable to connect to the
network until they are configured with a unique NetBIOS name. Duplicate NetBIOS names occur
most often when there is no structure to the naming scheme in a NetBIOS network.
– In small networks, the lack of a structure poses no real issue. In larger networks however, a system
for ensuring unique NetBIOS naming is strongly recommended.
– Note that the host name can be set using DHCP option 12. This option is intended for use when
using DHCP reservations (where an IP address is specifically reserved for a given MAC address),
as it allows for full host-specific network information to be controlled from a single administrative
interface. Obviously, using DHCP option 12 with dynamic DHCP clients would cause significant
problems on the network.
– Several tools are discussed in other modules for troubleshooting network problems, such as ping,
ipconfig, and winipcfg. Some additional tools useful for gathering TCP and NetBIOS information
are:
o netstat
o Nbtstat
– netstat can also be configured to re-query and re-display information at a configured interval. By
configuring netstat to re-query at intervals and directing this output to a text file, netstat can be
used to build a profile of the behavior of the host TCP/IP transport layer operations over time.
– Recall that NetBIOS uses a flat namespace, and that accurate NetBIOS name-to-IP address
mapping is important for correct operation of a NetBIOS-based network. The functions of nbtstat
are centered around reporting on and resetting the information in name tables on local machines,
remote machines, and central NetBIOS name servers.
– Also keep in mind that some network problems can be triggered or made more obvious as a result
of user behavior. For example, staff at a remote site might need to backup data to a central site
every afternoon before going home causing the WAN link to become congested. This activity is
likely to impact other users who are still working over the link. This particular problem may be
solved by changing the work process (stop backing up across the WAN link), by provisioning
more bandwidth, or possibly by implementing superior routing technologies such as Link
Fragmentation and Interleaving to better utilize the link bandwidth. When the symptom is regular
and predictable, it makes it easier to find the cause and solve the problem.
– Some network problems are intermittent. These sorts of network problems occur with no obvious
pattern and often just go away and reappear at will. Intermittent network problems are significantly
more complicated to troubleshoot because the ability to collect solid information becomes
increasingly difficult.
– Again, intermittent problems may be caused by user behavior. For example, assume a user is
loading a large file across the WAN. This obviously impacts the performance of the WAN link,
generating a support call to the IT help desk. By the time the IT help desk has been made aware of
the problem and investigates the issue, the file transfer has finished and the WAN link performance
has returned to normal.
– Intermittent problems can also be caused by the interaction of various technologies. Firewalls
running dynamic NAT, configuring NAT for load balancing, and running parallel links between
systems can all present intermittent problems in network communications. The key to solving these
sorts of issues is in understanding the technologies involved.
– Mechanisms for disassembling complex problems include gathering information from midpoints in
the network communications chain and disabling parts of the system to exclude them as being the
cause. This can involve recabling components of the network in order to insert monitoring hosts or
other troubleshooting tools, or to bypass suspected equipment. Gathering detailed log information
from key points in the communications chain can also help pinpoint specific problem areas.
– When resolving complex network problems, the network engineer should always keep a record of
changes being made. Keeping a log has the advantage of providing a record in case the
configuration changes need to be reversed. A log of activities performed also removes any doubt as
to whether a certain activity has been performed, helping the network engineer avoid repeating
troubleshooting activities.
– The access lists on Router D are not as complex as those on Router C and the network engineer
immediately spots and corrects a configuration error.
– The next test works and the problem is considered resolved. The final activity the network engineer
should perform is to remove any unnecessary configuration changes to the network. Using the log
of activities generated during troubleshooting, the network administrator identifies that the use of
the deny ip any any log command only provided diagnostic information and can be removed from
the configuration.
– As discussed in previous content, highly tuned translation timeouts combined with network
congestion can be the cause of intermittent problems in network communications. Different
transport layer protocols also have different timeout values by default and can be configured
individually. This can mislead network engineers when troubleshooting, as discussed below.
– Host A can now establish a connection with Server D, but loses connection when doing a large file
transfer. There is not any pattern as to the point during the transfer at which the connection is lost.
The network engineer suspects that this may be a problem with UDP packets being lost in transit,
but uses a protocol analyzer on the WAN link to make sure (installing the WAN protocol analyzer
interrupts network communications, so the engineer waits until everyone has gone out to lunch).
– Results from the protocol analyzer show that the router is receiving more TFTP packets than it
should. This means that there is a problem with the router. Examining the router system log in
greater detail, the network engineer finds some error messages stating that router has ‘…received
packets for which no translation exists…’.
– The large file is transferred successfully and the problem is considered resolved. After updating the
appropriate documentation, the network engineer removes the unnecessary additions to the
network configuration, such as the WAN protocol analyzer and the deny ip any any log statement
in the inbound ACL.
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
– This layer includes all application layer protocols that use the host-to-host transport protocols to
deliver data. Other functions that process user data such as data encryption, decryption,
compression and decompression, can also reside at the application layer.
– Most of the application layer protocols provide user services. Application layer protocols are
typically used for network management, file transfer, distributed file services, terminal emulation,
and electronic mail. However, new user services are often added (for example, VPNs, VoIP, and
so on).
– These and other network applications use the services of TCP/IP and other lower-layer Internet
protocols to provide users with basic network services.
– Application layer problems prevent services from being provided to application programs. A
problem at the application layer can result in unreachable or unusable resources when the physical,
data link, network, and transport layers are functional. It is possible to have full network
connectivity but the application simply cannot provide data.
– Another type of problem at the application layer occurs when the physical, data link, network, and
transport layers are functional, but the data transfer and requests for network services from a single
network service or application do not meet the normal expectations of a user.
– A problem at the application layer may cause users to complain that the network or the particular
application that they are working with is sluggish or slower than usual when transferring data or
requesting network services.
– If the protocol embeds IP addresses in the data portion of the packet and NAT has been configured
anywhere along the path of the packet, the NAT gateway will need to know how to deal with that
particular protocol or the connection will fail. NAT gateways typically change information in the
data portion of a packet only when they have been specifically coded to do so. Some examples of
protocols that embed IP addresses in the data portion of the packet are FTP, SQLNet, and
Microsoft WINS.
– If there is a question regarding whether a firewall or router is interfering with the flow of data for a
particular application or protocol, several steps can be taken to see what exactly is happening.
These steps may not all be possible in every situation.
– Please note that most traceroute programs send a UDP datagram to a randomly selected high UDP
port. Microsoft’s tracert uses an ICMP echo request message (a ping packet) instead, which may
explain why some trace results do not match those of other users.
– The Cisco IOS software offers powerful commands to help in monitoring and troubleshooting
network problems. The following highlights some of the most common and useful commands.
– The show commands help monitor installation behavior and normal network behavior, as well as
isolate problem areas.
– The debug commands assist in the isolation of protocol and configuration problems.
– How an administrator chooses to implement system logging and manage logging data may affect
their ability to manage their networks and effectively troubleshoot problems. Time should be taken
to develop a logging strategy that will provide reliable data when required.
– Monitoring activity in the log files is an important aspect of network management and should be
conducted regularly. Monitoring the log files allows the execution of appropriate and timely action
when problems are detected, such as breaches of security or events that are likely to lead to a
potential security breach.
– For example, logs can be invaluable in characterizing and responding to security incidents. To do
so, the most important events to log include change of interface status, changes to the system
configuration, access list matches, and events detected by the optional firewall and intrusion
detection features.
– The term "terminal emulator" refers to a terminal application that is implemented in software.
Clients can use the Telnet program to establish a terminal connection. Other software such as
HyperTerminal or TeraTerm can also be used and they typically offer more advanced features.
– Note: Debug output is normally sent to the console port. This means that if the connection is
established through the Telnet port, the debug output will not be seen. Use the terminal monitor
IOS command to redirect the output to any of the VTY ports. Keep the amount of debugging that is
enabled to a minimum.
– Note: RDP Protocol (Terminal Server) is a little known Telnet port (port 3389) used by Remote
Desktop Protocol (RDP). RDP is the remote Windows terminal protocol used by Microsoft
Windows NT 4.0, Terminal Server Edition operating system and Windows 2000 Terminal
Services. Keep this in mind when troubleshooting.
– For example, Telnetting to port 25 (SMTP) will verify that the e-mail server is answering. Telnet to
port 80 (HTTP) to verify the Web server is answering.
– Note: By default characters are not echoed in MS Telnet upon successful connection to a Web
Server unless 'local echo' is enabled in the preferences.
– The following table presents commands that can be used to troubleshoot a World Wide Web
network application. A troubleshooter uses the information from these commands to isolate
problems at the application layer that are related to the Web and the HTTP protocol.
– For example, assume User-A wants to send e-mail to User-B. When User-A clicks on the Send
button, e-mail is sent to the local e-mail server using the SMTP protocol. The e-mail server will
then send the e-mail using SMTP to User-B’s e-mail server. It remains stored there until User-B
collects it. Later, User-B connects to the local e-mail server and downloads the e-mails using either
POP3 or IMAP 4.
– If there is a problem with the receiving system, the user should see a text error message. If the
connection was successful, a hello message will be displayed or an unresponsive Telnet window
will open. This indicates connectivity to the server. At this point, the user could use POP3 or
SMTP text-based commands to perform basic e-mail procedures such as authenticate, read, delete,
or send messages.
– For example, basic POP commands include user, pass, stat, list, top, uidl, retr, dele, noop,
rset, and quit.
– FTP uses two or more TCP connections to accomplish data transfers. To start a session, the FTP
client opens a TCP connection to port 21 on the FTP server. This connection is called the control
connection and is used to pass commands and results between the client and the server. No data,
such as file transfers or directory listings, is passed over the control connection. Instead, data is
transferred over a separate TCP connection called the data connection.
– Reliability is not required because each request generates a response. If the SNMP application does
not receive a response, it simply re-issues the request. Sequencing is not needed because each
request and each response travels as a single datagram.
– The NMS periodically requests the status of each managed device (GetRequest) and each agent
responds with the status of its device (GetResponse).
– Making periodic requests is called polling. Polling reduces the burden on the agent because the
NMS decides when polls are needed, and the agent simply responds.
– Before DNS, network servers were identified using the IP addresses. However, this became very
cumbersome. Eventually, individuals started writing HOSTS files, which contained names of servers and IP
addresses assigned to them. This way, users would FTP or Telnet to a system by using their names instead
of the IP addresses. This worked well, and so the HOSTS file was placed on every system on the Internet.
– Because administrators of each system maintained the files independently, this created new problems. First,
if the text database changed, there was no way to update it automatically on every system. Essentially, the
response was to create a centralized HOSTS file, which would be the definitive HOSTS file on the Internet.
Routinely, administrators checked this central file for any changes and would update the HOSTS files on
their local systems when there were changes.
– This system had many problems. For example, with only one HOSTS file on the whole Internet, if that site
went down, nobody else knew what any of the DNS names were. Secondly, as more and more systems were
added, the HOSTS file started to get very big. Finally, the HOSTS names did not provide for any kind of
hierarchy. Therefore if somebody at one site wanted to have a computer named Admin, nobody else in the
whole world could have a computer named Admin.
– The answer to these problems was Domain Name Service (DNS). DNS allows computer systems to resolve
FQDN to IP addresses.
– Top-level domain names are part of most URLs. For example, “.com,” “.edu,” “.net,” “.gov,” and “.org” are
top-level domain names. These top-level domains contain the basis for the rest of the domain naming
structure. Individual organizations are granted second-level domain names within one or more of these top-
level domains. Because names have to be unique in a domain, they must be registered.
– When an organization wishes to acquire a second-level domain name, it must submit a request to the
Internet Network Information Center (InterNIC). If the domain name is available and the InterNIC does not
have a problem with the name, it is assigned to the organization in exchange for a small biannual fee. The
organization itself is responsible for assigning third-level and lower domains.
– The following section will provide common application layer problems and the suggested steps
required to solve these problems. The focus of this section is to develop an awareness of steps
required to logically solve problems.
– Many problems can stop a Telnet session from being established. The steps to troubleshoot
particular problems will change depending on the specific problem. However, a good
troubleshooter will be able to solve these problems by methodically eliminating potential issues.
– By consoling into the Toronto router and opening a Telnet session to Calgary, the possibility that
Telnet has been disabled, moved to another port, or is blocked by an inbound access-list has been
eliminated.
– While telnetted into the Calgary router, signs of recent configuration changes are checked by using
the show logging and show clock commands. No configuration changes have been made on
Calgary for several days, so the engineer returns to the console session on Toronto.
– The engineer looks for signs of recent configuration changes on Toronto with the show logging
and show clock commands. Although changes made to the running configuration cannot be
confirmed, the fact that someone else was in configuration mode on Toronto in the last few hours
can be confirmed.
– So far it is known that pings to Calgary from Toronto_SW are successful, but Telnet sessions are
not. Telnet sessions are possible from the Toronto router and possibly another administrator could
have made configuration changes on the Toronto router.
– Because of the facts, it is suspected that the problem is probably with an extended access list
filtering too much traffic. To confirm this suspicion, use the show access-lists command on the
Toronto router to review the current access lists configured.
– The only extended access list configured is called Traffic. Notice that it explicitly permits ICMP,
FTP, WWW, and TFTP traffic. However, the implicit deny at the end of the list would block
Telnet traffic that came from Toronto_SW.
– To determine which interface on Toronto is being used to forward traffic to Calgary, use the show
ip route command. This reveals that traffic for Calgary is sent across the interface named
Serial0/0:0.
– Finally, verify that the access list named Traffic is applied to Serial0/0:0 of Toronto with the show
ip interface serial 0/0:0 command. To see how Traffic is configured, review the access list in the
running configuration.
– The issue is now isolated. The outbound access list named Traffic does not include a permit
statement for Telnet. All Telnet traffic from the LAN traffic connected to the Toronto switch is
being filtered. The remark statement for the access list Traffic states that it should support
outbound TCP Telnet connections.
– The engineer corrects the extended access list named Traffic and adds a line to support Telnet
traffic from Toronto.
– Finally, verify the configuration change by consoling into Toronto_SW and Telnet to Calgary.
– The incomplete extended access list has been updated to support Telnet. The Application problem
has been resolved by correcting the transport layer problem and the baseline configuration has been
restored.
– The engineer attempts to reset the router to see if that will restore the IOS image. Entering the
reset command did not restore the image.
– He decides to look for the IOS image in the file system.
– Biff is correct. There is no IOS image in flash memory. At 5858 bytes, base.cfg is not big enough
to be an IOS image. The engineer learns from Biff that the image was erased while someone was
saving a backup configuration file.
– It is decided that TFTP should be used to recover the image. The engineer reviews the commands
available from ROMMON level.
– The engineer decides that tftpdnld is the command necessary to download the image from
Baltimore. Baltimore is running a TFTP server that is offering an image with the file name
flash:c1700-sv8y-mz.122-8.YL.bin.
– He enters the tftpdnld command. The attempt fails and the command output displays messages
that are symptoms of an issue with the TFTP application layer protocol.
– The engineer has isolated the TFTP issues to the tftpdnld ROMMON command needing the IP
address and mask for the local router, the default gateway for the local router, the IP address of the
TFTP server, and the name of the file to be transferred.
– A list of these values is shown below:
– Local IP address = 172.21.128.129
Local Mask = 255.255.255.128
Local Default Gateway = 172.21.128.130
TFTP Server = 172.22.128.129
File = c1700-sv8y-mz.122-8.YL.bin
– By reviewing the relevant information on http://www.cisco.com, the engineer realizes he needs to
enter variable_name=variable to set these variables.
– The engineer configures the TFTP variables on the Orlando router. This step is extremely case
sensitive. The variables have been configured, after he removes an extra space.
– The engineer now invokes the TFTP program. After configuring the parameters to support TFTP,
the TFTP download process seems to work. It appears that the application layer issue of missing
TFTP parameters has been resolved.
– The engineer now needs to boot the router using the new image.
– The IOS image has been restored. He finishes the task by restoring the baseline configuration files.
– Cisco IOS: Use show run and look for the name-server
– Windows 9x,ME: Use winipcfg.exe
– Windows XP, 2000, NT: Use ipconfig.exe
– UNIX Plattaform: Use cat /etc/resolv.conf
– If names within the local domain or a large number of external domains cannot be resolved, contact
the DNS administrator, since there may be a problem with the local DNS (or the local host could
be using the wrong domain server).
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________